Feb 6, 2015 2 min read Feb 6, 2015 Security Alerts Internet Explorer vulnerability puts user credentials at risk A major vulnerability in the latest version of Internet Explorer puts users at risk. Once again it seems to be related to XSS, which might allow cybercriminals to steal login credentials by luring unsuspecting users to a malicious website.
Feb 4, 2015 2 min read Feb 4, 2015 Security Alerts Another Flash vulnerability Still using Flash? Here is more troubling news. Yet another zero day vulnerability is found in Adobe Flash making it prone to exploitation by hackers.
Jan 28, 2015 1 min read Jan 28, 2015 Security Alerts Lizard Squad strikes again! Lizard Squad makes headlines again, claims to have taken down Facebook, Instagram and other social networking websites.
Jan 26, 2015 2 min read Jan 26, 2015 Security Alerts China capable of massive DDoS attacks China has been known for its involvement in such attacks in the past as well. Hopefully this will not be a regularity in the future.
Jan 22, 2015 2 min read Jan 22, 2015 Mobile Malware Security Alerts iPhones having spyware built-in? We all love our iPhones, but they may not be as secure as some of us think.
Jan 22, 2015 4 min read Jan 22, 2015 Malware Lab Zero Day Alert: Flash Player vulnerability exploited It's probably smart to remove or disable your Flash player, at least in the next few days. A new zero-day exploit has been discovered that attacks unknowing website visitors through a drive-by download attack.
Jan 17, 2015 10 min read Jan 17, 2015 Malware Lab Has the antivirus industry gone mad? Toolbars, adware, plugins or other downloads sneak onto your computer while installing free antivirus software.
Jan 15, 2015 3 min read Jan 15, 2015 Security Alerts Keysweeper: proof that it’s relatively simple to hack a wireless keyboard For just $10, a hacker can create a camouflaged USB charging device that tracks and logs everything you type on a wireless keyboard.
Jan 13, 2015 2 min read Jan 13, 2015 Security Alerts North Korea’s official news site delivers malware Hackers use the "watering hole" technique in order to steal passwords. The malware still have security researchers scratching their heads on what else it can do.
Jan 12, 2015 3 min read Jan 12, 2015 Malware Lab Hackers Anonymous declare (cyber)war on terrorists after Paris attacks The hackers group promises the world to track online activity, close social media accounts and jihadist websites of terrorists plus everything else in power to shut terrorists down online.